Which of the following is used to ensure information integrity?
a. Auditing
b. Digital signatures
c. Backups
d. Passwords
ANS: B
Computer Science & Information Technology
You might also like to view...
Files that are read by the computer are called ____ files.
A. output B. readOnly C. writeOnly D. input
Computer Science & Information Technology
A ________ is approximately one thousand bytes
A) terabyte B) megabyte C) byte D) kilobyte
Computer Science & Information Technology
Data structures are part of an ADT’s ______.
a) definition b) implementation c) specifications d) usage
Computer Science & Information Technology
The minimum number of times a loop can iterate is
a. 1 b. 5 c. 0 d. -1
Computer Science & Information Technology